You are on page 1of 32

CSC-101

Introduction to Information Technology

Issued by BSCCSIT.COM Email: admin@bsccsit.com Web: http://www.bsccsit.com Social networking


http://www.facebook.com/bscsit

Downloaded from: http://www.bsccsit.com

Unit 1: Introduction to Computer System


Information Technology:
IT is the techniques used in Information System. An information system collects, processes, stores, analyzes, and disseminates information for a specific purpose. Communication is the backbone of IT. IT can be defined as the implementation of Information Science where Information Science is a set of algorithms, principles and theories. Computer System, Internet, Telecommunication systems are the information technology we use. Information systems are scattered throughout organizations, often in several locations and sometimes in two or more organizations. IT is implemented here to relay the information between these locations. Not only the organization but also the individual today is dependant on IT for career development and education. Education Institutions today provide distant education and online examinations. GIS has emerged due to the development in IT. Scientists now are able to acquire geographical information from the satellites.

Evolution of Information Processing


Information Processing evolved due to the growth of national and international organizations. Since the early computing days, as costs declined and computer technologies improved, computers have been used to support managerial and other organizational activities of every sort.

Scopes/ Application field of Information System


Telecommunication Internet GIS Education Security System E-Governance Medicine Scientific Research

1.1 Introduction to Computers


A computer is a programmable electronic machine. It takes raw facts as input, process these and gives the final output which is the result of processing. It responds to a specific set of instructions in a well-defined manner. It can execute a prerecorded list of instructions (a program).

1.2. Classification of Digital Computers (Types of Computers)


Computers can be classified by their size and power as follows: 1. Super Computers 2. Mainframe Computers 3. Mini Computers 4. Work Stations 5. Micro Computers/ Personal Computer a) Super Computers They are the computers with the most processing power. For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

The primary application of supercomputers has been in scientific and military work, but their use is growing in business as their prices decreases. They are especially valuable for large simulation models of real world phenomena, where complex mathematical representations and calculations are required or for image creation and processing. They are also used in weather prediction, design aircraft( Boeing 777), motion picture like star wars and Jurassic Park) They operate generally at 4 to 10 times faster than the next most powerful computer class., the mainframe.

a) Mainframe Computers They are less powerful and generally less expensive than supercomputers. Large corporate use mainframe computers for centralized data processing maintaining large databases. Application than run on a mainframe can be large and complex, allowing for data and information to be shared throughout the organization. Examples: Airline Reservation System, Corporate Payroll, Student Information etc. A mainframe system may have anywhere from 50megabytes to several gigabytes of primary storage. Secondary storage may use high capacity magnetic and optical storage media with capacities in the gigabytes to terabyte range. Typically, several hundreds or thousands or online computers can be linked to a mainframe. Advance mainframe performs more than 1,000 MIPS and can handle up to one billion transactions per day. b) Mini Computers Also called midrange computers, are relatively small, inexpensive and compact computers that perform the same functions as mainframe computers but to limited extent. They are designed specially for accomplishing specific tasks such as process control, scientific research, and engineering applications. IBM is the market leader in minicomputers with its AS/400 series of computers. Larger companies gain greater corporate flexibility by distributing data processing with minicomputers in organizations units instead of centralization at one place. They form the network. c) Workstations Computers vendors originally developed desktop engineering workstations or to provide the high levels of performance demanded by engineers. They are based on RISC (Reduced Instruction Set Computing) architecture and provide both very high speed calculations and high resolution graphic displays. The distinction between workstation and personal computers is rapidly blurring. The latest PC s has the computing power of recent workstation. d) Micro Computers These are also called PCs and are the smallest and least expensive category of general purpose computers. Micro computer ranges from palmtops to Desktop computers. Laptops/ Notebooks are very popular now a day. Microprocessor is the core part of the Micro computers which forms the CPU.

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

1.3. Anatomy of Digital Computers


Functions and Components of a Computer: To function properly, the computer needs both hardware and software. Hardware consists of the mechanical and electronic devices, which we can see and touch. The different parts of the computer are Processor (CPU), Input devices, Output devices, Storage devices and Memory devices. The software consists of programs, the operating systems and the data that reside in the memory and storage devices. A computer does mainly the following four functions: Receive input Accept information from outside through various input devices like the keyboard, mouse, etc. Produce information Perform arithmetic or logical operations on the information. Produce output Communicate information to the outside word through output devices like monitor, printer, etc. Store information Store the information in storage devices like hard disk, floppy disks, etc. Computer hardware falls into two categories: processing hardware, which consists of the central processing unit (CPU), and the peripheral devices. The CPU, as its name implies, is where the data processing is done. Peripheral devices allow people to interact with the CPU. Together, they make it possible to use the computer for a variety of tasks. Explain CPU and its different components: CU, ALU and MU. How CPU and memory does works? An instruction is fetched from primary storage by the Control Unit The Control Unit decodes the instruction The ALU receives the data and the instruction and performs the calculation or comparison The result is stored in primary storage which is sent to the proper output device.

1.4. Computer Architecture


History: Describe from Pascaline to the first generation computers: Pascaline In 1642, 19 year old French mathematician Blaise pascal invented a mechanical adding-machine called pascaline. The numbers were entered by means of add and subtract. It had 8 wheels and each wheel had 10 digits from 0 to 9. Stepped Recknor In 1671, German mathematician Gothfried von Leibnitsz invented an improved and strong computing machine called stepped Recknor which could multiply, divide and workout square roots apart from addition and subtraction. The machine also had handle and gear. Analytical Engine In 1833, Charles Babbage, (English mathematician) developed Analytical Engine which was a kind of a general purpose computer designed to solve any arithmetical problems. It was significant in a way that it had most of the elements present in todays digital computer systems, thats why hes called Father of modern computer science. 3 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Lady Ada Augusta, disciple of charles Babbage, after his demise developed several programs for performing mathematical calculations on Analytical engine. She is considered as the first programmer in history and has to her credit a computer language called ADA named after her. Dr. Herman Hollerith In 1890AD, Herman Hollerith designed a system to record census data. The information was stored as holes in punched cards, which were interpreted by machines with electrical sensors. Mark-I In 1944 Howard Aiken completed mark I. It was an electromechanical computer which was 51ft. long, 8 ft. height, and 3 ft wide and consisted of 18000 vacuum tubes. This consisted of 7 lakh 50 thousand parts and 500 miles long wire. Electronic Numerical integration and calculator (ENIAC) 1946 A.D. ENIAC was the first electronic computer developed by John Mauchly and John presper Eckret in 1946. It could do 5000 additions per second. It was extremely huge, used 19,000 vacuum tubes, occupied an area of 150 sq. meters, weighed about 30 tons and required about 130 kW of power. EDVAC: In 1952, Electronic Discrete Variable Automatic Computer (EDVAC) was developed by John Mauchly and John Presper Eckert with the help of A. Burks and Neumann. This machine was used to store the data and information as well as the instructions. John Mauchly and Eckert founded their own company in 1946 and began to work on Universal Automatic Computer (UNIVAC): general purpose commercial computer in 1951. It was the first commercially used electronic computer in the world. In 1958, the first computer to use the transistor as a switching device, the IBM 7090, was introduced. In 1964, the first computer to use Integrated circuits (IC), the IBM 360 was announced. In 1975, the first microcomputer, the Altair, was introduced. In the same year, the first Supercomputer, the Cray-1 was announced. RISC/ CISC RISC (Reduced Instruction Set Computer) processors are designed for speeding up the processing power of the computer making the chip as simple as possible so that it uses less space and shorter design cycle. It is possible to use the technique of pipelining using RISC processors which gives the immense processing power. The advantages of RISC processors are as follows: 1. Speed: Due to simplified instruction set RISC processors are 2 to 4 times faster. 2. Simpler hardware- Because of simpler instruction set the RISC processor uses much less chip space, as a result extra functions are also placed in the same chip. 3. Shorter design cycle- Because of simple hardware and less instruction per task, the RISC processor uses very short machine cycles. CISC (Complex Instruction Set Computer) processors use microcode, build rich instruction sets and build high-level instruction sets and these were the building blocks until the late 1980s and are still in major use today. Some characteristics are: 1. Complex instruction-decoding logic, driven by the need for a single instruction to support multiple addressing modes. 2. A small number of general purpose registers. 3. Several special purposes register. 4 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Advantages of CISC: 1. Microprogramming is as easy as assembly language to implement, and much less expensive than hardwiring a control unit. 2. The ease of micro-coding new instructions allowed the designers to make CISC machines upwardly compatible, i.e. a new computer could run the same programs as earlier computers. 3. As each instruction became more capable, fewer instructions could be used to implement a given task. 4. Because micro-program instruction sets can be written to match the constructs of highlevel languages, the compiler does not have to be complicated. The disadvantages of CISC: 1. The instruction set and chip hardware became more complex with each generation of computers. 2. The instructions set were lengthy and took more time to execute, slowing down the overall performance of the machine. 3. Many specialized instructions arent used frequently enough to justify their existence.

1.5. Number System


Refer to the exercise covered during the class. Binary Subtraction using complements method is left for further discussion later after the Final Evaluation exam. Memory Units: Memory units are the internal storages areas in a computer. These are in the form of chips. Usually we classify the computers memory into two categories: RAM and ROM. RAM (Random Access Memory): This is the main memory of the computer. This is also found in other devices like printers. This memory holds data as long as the electricity is supplied and therefore referred to as volatile memory. There are two basic types of RAM: (i) Dynamic RAM (DRAM) and (ii) Static RAM (SRAM). Dynamic RAM needs to be refreshed thousands of times per second. Static RAM needs to be refreshed less often, which makes it faster; but it is more expensive than dynamic RAM. ROM (Read Only Memory) It is a non-volatile memory. The data is prerecorded in ROM. The program stored in ROM is known as Firmware and is programmed by the manufacturer. Once data has been written onto a ROM chip, it cannot be removed and can only be read. Most personal computers contain a small amount of ROM that stores critical programs such as the program that boots the computer.

1.6. Auxiliary Storage Units


Hard Disk: A Hard disk is internal hardware which stores and provides access to large amounts of information. Hard disks have much greater data capacity and are much faster to use than floppy disks. Usually, it is a fixed disk, permanently sealed in the drive. Most new computers include an internal hard disk that contains several gigabytes or terabytes of storage capacity. The head of hard disk that reads the data floats over the hard disks surface, while the head of the floppy disk touches the disks surface while reading or writing data. 5 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Hard disk is a flat, circular, rigid plate with a magnetizable surface on one or both sides of which data can be stored. Hard disks are rigid aluminum or glass disks about 3.5 in diameter in a personal computer, and smaller in a laptop. Data is transferred magnetically by a read/write head. A hard disk is made of metallic disk coated with metallic oxide on both sides. To increase the storing capacity, several disks (platter) are packed together and mounted on a common drive to form a disk pack. A hard disk can have more than 1000 tracks per surface and contain 17 sectors per track.

Optical Disk An emerging technology that many expect will have a profound impact on mass storage strategies in the 1990s is the Optical Disk. With this technology becomes laser beams to wrote and read data at incredible densities. Thousand of times finer than the density of a typical magnetic disk. Data are placed onto optical disks with high-intensity laser beams that burn tiny holes into the disks surface. Optical disk systems have recently started to become widely used on microcomputer systems. So, it is a storage medium from which data is read and to which it is written by lasers. Store much more data in portable magnetic media. There are three basic types of optical disks. CD-ROM (compact disk read only memory) WORM ( write once read many) ERASABLE These three are not compatible with one another. WORM (Write-one Read-many) With a WORD disk, you can write data, but only once and then you can read number of times. ERASABLE Optical (rewritable & erasable) Can be read to, written to and erased just like magnetic disk. CD-R (Compact Disk Recordable) CD-RD (Compact Disk Rewritable) DVD (Digital Versatile Disc) Initial storage capacity of 4.7GB digital information on a single sided, single layer. Diameter & thickness is same as CD-ROM. Magnetic Tape: Magnetic tape is a plastic tape with a magnetic surface for storing data as a series of magnetic spots. Magnetic tape has been one of the most prominent secondary storage alternatives. Magnetic tape is the most commonly used sequential access secondary storage medium. It is available in the form of cassettes, real & cartridges. Among these three, Reels are the most popular storage secondary media. Magnetic tape is a plastic ribbon coated on one side with iron oxide that can be magnetized Floppy Disk: Floppy disk is a soft magnetic disk. Floppy disks are being replaced by pen drives now a days. Foppy disks are slower to access than hard disks and have very less storage capacity.

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

1.7. Input Devices How does a Keyboard Work


Layout

Computer keyboards are an input device. They put the information a person types into a program on the computer. Most keyboards have 80 to 110 keys. The numbers and letters on the keyboard are displayed keycaps--these are the buttons that are pressed when a person types. The layout of the numbers and letters are the same on every keyboard and they are referred to as the QWERTY.

Key matrix

The inside of the keyboard is like a mini-computer and consists of a processor and circuits. These transfer the information to the processor inside of the computer. Inside of the keyboard's processor resides the key matrix. The key matrix is a grid of circuits. These circuits are individually placed under each key. When a key is pushed, it pushes the switch on the circuit board underneath the key causing an electrical current to pass through the circuit and into the processor. When the current passes through, the switch vibrates, signaling the processor to read it. Depending upon the working principle, there are two main types of keys, namely, capacitive and hard-contact

Capacitive Key

On the underside of a capacitive key, a metal plunger is fixed which helps in activating the circuit flow. When a capacitive key is pressed, the metal plunger applies a gentle pressure to the circuit board. The pressure is identified by the computer and the circuit flow is initiated, resulting in the transfer of information from the circuit to the currently installed software.

Hard Contact Key

A hard contact key is attached with a metallic plate that helps in connecting the circuit board. When the hard contact key is pressed, it pushes a metallic plate, which in turn touches the metallic portion of the circuit plate. This overall process of completing a circuit results in a circuit flow, allowing the transfer of the message to the central processing unit (CPU), which is further transmitted to the software.

Working principles of mouse


7 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

The mouse is a pointing device which helps us to operate the computer. Unlike the complicated hardwares such as Mother board, RAM, Hard disk, Processor of the computer, the mouse is designed with a simple circuit to process. Now a days, we get varieties of mouse with different technologies in the market. In recent days, the optical mouse had overcome the old ball mouse, because of its 'easy to use' function. The main components of the optical mouse are: Inbuilt optical sensor High speed camera which can take 1000 pictures at a time LED These optical mouses do have an inbuilt optical sensor. The optical sensor reads the movements of the optical mouse (moved by the user) with the help of the light rays which comes out from the bottom. When the user moves the optical mouse, the LED (Light Emitting Diode) present inside the mouse emits the light according the minute movements. These movements are send to the camera as light rays. The camera captures the difference in light rays as images. When the camera captures the images, each and every pictures and compared to one another with the digital technology. With the comparison, the speed of the mouse and the direction of the movement of the mouse are rapidly calculated. According to the calculation, the pointer moves on the screen.

Working principles of scanner


The basic principle of a scanner is to analyze an image and process it in some way. Image and text capture (optical character recognition or OCR) allow to save information to a file on user computer. user can then alter or enhance the image, print it out or use it on their Web page. Types of Scanners: 1. Flatbed Scanners 2. Hand Held Scanners How a Flatbed Scanner Works

A light source underneath the picture or document illuminates the image. Spaces white or blank reflect more light than do inked and colored areas.

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

A motor moves the scan head underneath the page. when the scan head is moving it captures light that was reflected from individual areas of the page about 1/90,000 of an inch Light from this page is bounced through an intricate system of mirrors that must continually pivot to keep the light beams aligned with a lens. A lens focuses the beams of light into light sensitive diodes that translate the amount of light into an electric current. The amount of the current depends on the amount of light reflected, the greater the amount of light reflected the greater the current. The analog to digital (A-D) converter stores each analog reading of voltage as a digital pixel representing either a black or white area. Scanners that are more sophisticated can translate the voltage into shades of gray. In a color scanner, the scan head makes 3 passes under the image and the light on each pass is directed through a red, green or blue filter before it strikes the original image. The digital information is sent to the pc where it is translated into a format that a graphics program can read.

How A Hand-Held Scanner Works

On the majority of handheld scanners when you press the scan button a light-emitting diode (sometimes called a LED) illuminates the image below the scanner. An inverted, angled mirror that sits right above the scanner's window reflects the image onto a lens in the back of the scanner. The lens focuses a single line of the image onto a CCD (known as a charge coupled device), which is a component designed to detect subtle changes of voltage. As the light shines onto sever rows of light detectors located on the CCD, each registers the amount of light as a voltage level that equals to black, white or gray. Special analog chips receive light voltage generated by the CCD for gamma correction. This process enhances the black tones into an image that is that the eye will have been able to recognize the shades of the image easier. The line of the image now is moved to the analog-digital converter. In a gray scale scanner, the converter assigns 8 bits to each pixel, or 256 shades of gray. As the disk turns, a light shines through the slits and is detected by a photomicrosensor on the other side of the disk. When light strikes the sensor it throws a switch that sends a signal to the A-D converter. This signal tells the converter to send the line of bit generated to the computer. Then the converter clears itself of the old data. The computer then moves to the next line. For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Working principles of Track Ball


Trackball mice don't have a sensor at the bottom to take a picture of the desk -- indeed, they don't move across the desk at all, but they do use the same principle. Instead of taking pictures of the desk to detect movement as a mouse does, a trackball will be taking continual pictures of the ball itself, which usually has many tiny dots on the surface and when these dots move, the small processor inside responds by moving user cursor accordingly. In track ball spherical ball is mounted in a base with only a portion projecting above the surface. The ball is free to rotate in any direction. Two valuators either potentiometers or shaft encoders mounted in the base sense the rotation of the ball and provides results proportional to its relative position. In addition to feedback from the normal tracking symbol users obtain tactile feedback from the rotation rate momentum of the ball. Trackball are frequently equipped with buttons in order they can be substituted for a mouse and are more ergonomically acceptable than mouse.

10

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Working principles of Graphic Tablets


Graphic tablet also referred to as a digitizing tablet, graphics pad, or drawing tablet, a tablet is an alternate type of input device that can be used in place of, or in conjunction with, a mouse, trackball, or other pointing device. The tablet consists of two parts, a flat surface for drawing, and a pen, stylus, or puck that is programmed to work with the tablet. The tablet cores to be film coated make continual orbital motions within the closed rotating drum under the action of a streamlined guide plate. During the motion, coating medium automatically sprays according to the technological process and rational technological parameters, at the same time hot air is supplied under a negative pressure. The hot air penetrates through the tablet core layers and is discharged from the bottom of the layers, so that the coating medium sprayed on the surface will dry rapidly and evenly, thus forming a solid and smooth surface film.

Most tablets these days have a USB interface which is ideal since most computers in use today support USB. Bluetooth is another option for connecting a graphics tablet to user computer without the use of wires. Bluetooth is a wireless protocol frequently used for connecting electronics devices. Currently, Wacom is the only manufacturer of producing a Bluetooth-capable tablet, the Graphire Bluetooth, which can connect to user computer without wires.

1.8. Output Devices


An output device is any piece of computer hardware equipment used to communicate the results of data processing carried out by an information processing system to the outside world. Outputs are the signals or data sent by the system to the outside. Examples of output devices:

Speakers Headphones Plotters Printer

Plotters
A plotter is a graphics printer that uses a pen or pencil to draw images. Plotters use continuous lines to create images. Plotters are connected to computers and are used to produce complex images and text. However, plotters are much slower than printers because of the mechanical 11 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

motion necessary to draw detailed graphics using continuous lines. Architects and product designers use plotters for technical drawings and computer-aided design purposes since plotters have the ability to create large images on oversized sheets of paper. How Plotters Work The first step in using a plotter is to enter the appropriate coordinates for where user wants the image to appear on the paper. Once the schematics for the image are complete, the computer downloads the coordinates to the plotter, which interprets the code and calculates the most efficient path for the pen and paper. Early plotters contained two separate pens, one that moved vertically and one that moved horizontally. These plotters were limited in terms of the complexity of the images they could produce as well as the speed at which they could operate. Modern plotters use a sliding roller, which moves the paper against a stationary pen. A plotter pen is usually a hollow fiber rod with a sharpened end. The ink supply runs through the center of the rod and dispenses through the sharpened tip. The paper moves horizontally and vertically against the pen until the drawing is complete.

Printer
A printer is a peripheral which produces a text and/or graphics of documents stored in electronic form, usually on physical print media such as paper or transparencies. Many printers are primarily used as local peripherals and are attached by a printer cable or in most new printers, a USB cable to a computer which serves as a document source. Some printers, commonly known as network printers, have built-in network interfaces, typically wireless and/or Ethernet based, and can serve as a hard copy device for any user on the network. Individual printers are often designed to support both local and network connected users at the same time. Types of printers 1. Impact type 2. Non-impact type Impact Type To create text or image by physically make the print head to press the ink ribbon and cause the ink deposition on the paper in desired form is called impact type. Normally it is quite louder in nature when compared to other types of printers. The well-known example for impact type is Dot Matrix and Daisy wheel. Some of the latest impact based in the market is Line printer (high speed impact printer), IBM electromagnetic table printing machine. Non-Impact Type This produce text or images on paper without striking the paper physically are called as nonimpact type. These are not louder when compared to other types of printers. The well-known example of this type is Thermal printer, lasers and inkjets 12 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Dot matrix printer How do dot matrix printers work? A dot matrix printer print head contain clusters of pins. The printer can push the pins out to form pattern in rapid sequence. The pins pressed an inked ribbon against the paper creating an image. Lower resolution printer have 9 pins, higher resolution have 24 pins. Speed is measured in character per second (CPS).some dot matrix printer print 500cps.

Inkjet printer How do inkjet matrix printers work? Inkjet printer sprays tiny droplets of ink onto the paper. Inkjet printer does not physically touch the paper. A print head scans the page in horizontal stripes, using the printer's motor assembly to move it from left to right and back again, while the paper is rolled up in vertical steps, again by the printer. A strip (or row) of the image is printed, then the paper moves on, ready for the next strip. To speed things up, the print head doesnt print just a single row of pixels in each pass, but a vertical row of pixels at a time. Inkjet printers print head takes about half a second to print the strip across a page. Inkjet printer offers speed of 2-4 pages per minute (ppm). Inkjet printers are inexpensive and low operating cost.

13

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Laser printer How does laser printer work? Laser printer is a non-impact high-resolution printer which uses a rotating disk to reflect laser beams to form an electrostatic image on a selenium imaging drum. The developer drum transfers toner from the toner bin to the charged areas of the imaging drum, which then transfers it onto the paper into which it is fused by heat. Toner is dry ink powder, generally a plastic heatsensitive polymer. Laser printers using chemical photo reproduction techniques can produce resolutions of up to 2400 DPI.

The photoconductive drum is given a positive or negative charge by the charge Corona wire. When the drum starts to revolve, a laser beam is shone on it. This laser beam consists of light photons. The laser assembly shines the laser beam on a mirror which is then reflected off the mirror. As a result, the drum that is made up of photoconductive material is discharged. The areas of the drum that are touched by the laser develop charge that is opposite to the charge of the drum. The laser etches figures and characters on the surface of the photoconductive drum. The figures or characters are actually a pattern of electric charges. In this case let us assume that the drum is positively charges. Therefore, the laser etched areas will be negatively charged. Thereafter, a fine ink powder called toner is sprinkled on the paper. This powder has to be positively charged. As the drum rolls, the toner adheres to the laser-etched area of the drum. It is repelled from the positively charged area of the drum. Thus, the laser pattern is etched on the drum with the toner. After this, the drum rolls over the paper. The paper passes along a belt under the drum. The paper is given a negative e charge. This negative charge must be stronger than the charge of the laser-etched electric image. This will aid the toner to leave the negative area on the drum for the negatively charged paper. The paper is discharged as it moves out. This will prevent the paper from getting attached to the positively charged drum. The paper moves at the same speed as the drum. The paper is passed through a fuse. As the paper passes through a fuser, the toner melts due to hear. The tone is thus fixed on the paper. The fuser rolls out the paper to the output tray. The printing process of a laser printer is thus complete.

14

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Projector How do dot projector work? A projector is a device that uses light and lenses to take an image and project a magnified image onto a larger screen or wall. Projectors can magnify still or moving images depending on how they are built. The image must be shone through a sealed tube or frame when passing through the lenses to maintain focus. The video projector contains LCD panel. At the centre of projector is a halogen bulb which is surrounded by panel. The panel produce light. As the halogen bulb heat up the crystal melt and allow more light to pass through. Hence the intensity of halogen bulb brings about the difference in tones. Higher the temperature of bulb lighters the tone. Images travel to the tube present inside the projector from DVD player or satellite box. These images are turned bound on a screen that is coated with phosphorus. Every fragment of light hitting the screen is termed as pixel. On heating the screen the pixel break down into its colour components i.e. red, green and blue. The heat produce by halogen, bulb is controlled by voltage that flow into LCD video projector.

Advantages of projector 1. 2. 3. 4. 5. Produce sharper images. They have an edge in light efficiency. They generate largest possible image size. Low cost. Space saving.

Disadvantages of projector 1. 2. 3. 4. Image quality may not be as good as projected. Dark room often required. Maintenance required. The pixel on the chip can burn out. When one pixel burn out the whole chip will have to replace.

15

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Unit 2: Computer Software and Software Development


2.1. Software

Software is a collection of set of programs, which are used to execute all kinds of specific instruction. It consists of a number of machine instructions, array in a specific order to perform a particular task. Software is used to describe all the programs and its associated documents which run on a computer. So, a computer needs both software and hardware for its proper functioning. Software means computer instructions or data. Anything that can be stored electronically is software. Firmware are software (programs or data) that has been permanently written onto readonly memory (ROM) . All software falls into two general types or categories: System Software and Application Software. System software consists of low-level programs that interact with the computer at very basic level. This includes operating systems, compilers, and utilities for managing resources. On the other hand, application software includes database programs, word processors, and spreadsheets.

Examples of System software are as follows:


a) Operating Systems Operating systems are the most important programs that run on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping tracks of files and directories on the disk and controlling peripheral devices such as disk drives and printers. Most commonly used operating systems include Microsoft Windows, DOS, Xenix, Mac OS, OS/2, UNIX, MVS, etc. b) Compilers and Interpreters Compiler is a program that translates source code into object code. The compiler takes the entire piece of source code and collects and recognizes the instructions. In contrast, the interpreter analyzes and executes each line of source code in succession, without looking at the entire program. The advantage of interpreters is that they can execute a program immediately but compilers require some time before an executable program emerges. However, programs produced by compilers run much faster than the same programs executed by an interpreter. c) Device Drivers Device drivers are the software to run the particular peripheral devices like printers, wireless mouse, modems, and Ethernet cards etc. Most of the peripheral devices attached with the CPU needs device drivers to carry out the functions. Mostly we get device drivers at the time of buying these devices. For example we get the printer driver when we buy the printer. Device driver lets the CPU know the type of hardware and the type of instruction for a particular device attached with it.

16

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Examples of Application Software are as follows:


a) Word Processors A word processor is a program that makes us possible to perform word processing functions. We can create, edit, and print documents using word processors. We have many features that help us to prepare a fine document. Some of the important features of word processors are: editing, spelling checking, page setup, paragraph alignments, merging documents, typing in columns etc. MS-Word is the word's most popular word-processor. Although every word processor provides almost the same features, MS-Word is most flexible to work with. It is used to write documents or letter. A file in Ms-Word is called a document. When a file is saved, MS-Word attaches the extension .doc to the file. b) Spreadsheets A spreadsheet is a table of values arranged in rows and columns. Each value can have a predefined relationship to the other values. If one value is changed, others values need to be changed as well. Spreadsheet applications are computer programs that let you create and manipulate spreadsheets electronically. In a spreadsheet application, each value sits in a cell. We can define what type of data is in each cell and how different cells depend on one another. The relationships between cells are called formulas, and the names of the cells are called labels. Once we have defined the cells and the formulas for linking them together, we can enter the data. We can then modify selected values to see how all the other values change accordingly. What-if analysis makes the complex decision-making a very easy process. MS-Excel is one of the most popular spreadsheet applications. c) Multimedia applications Multimedia applications make us possible to run audio and video files. This application recognizes the digital signals and provides necessary signal to output devices and movie signals to the monitor and audio to the audio devices. Along with the video data we also get the text information about the file we are running. In windows operating system Windows Media Player is a good option to play the multimedia files. d) Presentation Graphics Presentation Graphics enable users to create highly stylized images for slide shows and reports. The software includes functions for creating various types of charts and graphs and for inserting text in variety of fonts. Most systems enable us to import data from a spreadsheet application to create the charts and graphs. Presentation graphics is often called business graphics. Some of the popular presentation graphics software are Microsoft PowerPoint, Lotus Freelance Graphics, Harvard Presentation Graphics, etc.

Utility Software Utility is a program that performs a very specific task, usually related to managing system resources. Antivirus software, Disk Partition tools are the examples of utility software.

17

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

2.2.

Operating System

OS is an important system software package found in every computer systems. It is a set of programs that controls and supervises a computer systems hardware and it provides services to computer users. It permits the computer to supervise its own operations by automatically calling in application programs and managing data needed to produce the output desired by users. OS is an interface between the user and the computer. OS perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers. OS, as a resource manager keeps track of who is using which resource, to grant resource requests, to account for usage and to mediate conflicting requests from different programs and users. Functions of an Operating System: Job Management: OS manages the jobs waiting to be processed. It recognizes the jobs, identifies their priorities, determines whether the appropriate main memory and secondary storage capability they require is available, and schedules and finally runs each job at the appropriate moment.

Batch Processing: Data are accumulated and processed in groups. The printing tasks in the printer are also done in groups. Most of the tasks of OS are grouped and performed one by one.

On-line Processing: In on-line processing, data are processed instantaneously. Most on-line operating systems have multi-user and multitasking capabilities. Now a day we can access the data from the remote sites using on-line processing.

Data Management: OS manages the storage and retrieval of data. As the system software handles many of the details associated with this process, such details are not a primary concern for users or programmers writing application programs.

Virtual Storage: Using this method the capacity of main memory increases without actually increasing its size. This is done by breaking a job into sequences of instructions, called pages or segments, and keeping only a few of these in main memory at a time; the remaining are kept on secondary storage devices. Thus, relatively large jobs can be processed by a CPU.

Input/ Output Management: OS manages the input to and output from a computer system. This applies to the flow of data among computers, terminals, and other devices such as printers. Application programs used the operating system extensively to handle input and output devices as needed.

Function of operating system can be further listed as follows: user interface implementation share hardware implementation Allows users to share data. Prevent users from interfering with one another. Scheduling resources among users. Facilitate input/output 18 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Facilitate parallel operations Organize data for secure and rapid access. Handle network communications

Classification of Operating System: Multi-user: These systems allow two or more users to run programs at the same time. Some OS permit hundreds or even thousands of concurrent users. The operating systems of mainframes and minicomputer are multi-user systems. Examples are MVS, UNIX, etc. Another term for multi-user is time-sharing. Multiprocessing: It refers to a computer systems ability to support more than one process (program) at the same time. This system allows the simultaneous execution of programs on a computer that has several CPUs. Mainframe, Supercomputers have more than one CPU.

Multitasking: This system allows a single CPU to execute what appears to be more than one program at the same time when, in fact, only one program is being executed. In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives the appearance of executing all of the programs at the same time.

Multithreading: Multithreading allows different parts of a single program to run concurrently. Multithreading is the ability of an OS to execute different parts of a program, called threads, simultaneously.

Real-time: These operating systems are system that responds to input immediately. It allows a computer to control or monitor tasks performed by other machines and people by responding to the input data in the required amount of time.

19

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

2.3.

Programming Languages

Programming Language is a set of rules that provides a way of instructing the computer to perform certain operations. Programming languages are said to be lower or higher, depending on whether they are closer to the language the computer itself uses or to the language that people uses. We can study the programming languages under five levels (or generations) of language: 1. Machine Languages / First generation Languages 2. Assembly languages / 2nd Generation Languages 3. Procedural Languages/ Third-generation Languages 4. Problem-oriented Languages / Fourth generation Languages 5. Natural Languages / Fifth Generation Languages. The characteristics & trends of these five languages are summarized in the following table: First Second Third Fourth Fifth Generation Generation Generation Generation Generation Trend : Towards Conversational natural programming language User-written programs Machine Language Packaged Programs Symbolic Language Operating Systems High-Level Languages Database Management Systems Fourth Generation Languages Natural Languages Natural Languages

Software Trends

Multipurpose Microcomputer graphicPackages interfaced packages. Trend: Towards easy to use multi-purposed application packages

Computer programming languages are developed with the primary objectives without the need to know in detail the internal structure of the computer. Machine Language A program written using the binary codes specified for a processor's operations and absolute binary addresses is known as machine language of the computer. The programs written in Machine languages are machine dependent. Programming using Machine Language is very tedious and time consuming. The programmer must keep track of a tremendous amount of detail and one must understand the technical operations of the computer. Programming in machine code has one advantage over programming at other language levels - its execution is very fast and efficient because the computer can accept the machine code as it is. Assembly Language Assembly languages are also known as symbolic languages as they use abbreviations or mnemonic code which replace the 0s and 1s of machine language. An assembly language has a one-to-one correspondence with the machine language of a computer and is thus machine dependent. Assembly languages are more standardized and easier to use than machine languages. 20 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Though more standardized than machine languages, assembly languages are still machine dependent. High Level Languages High level languages are the programming languages that use predefined common English words and clauses to write a program. They assisted programmers by reducing further the number of computer operations details they has to specify, so that they could concentrate more on the logic needed to solve the problem. We can classify the high level languages into three levels: Procedural-oriented or third generation Problem-oriented or fourth generation Natural or fifth generation Procedural oriented Languages General-purpose programming languages are called procedural languages or third generation languages. They are the languages such as Pascal, BASIC, COBOL, and FORTAN, C which are designed to express the logic, the procedure, of a problem. Because of their flexibility, procedural languages are able to solve a variety of problems. More focus is given to module while programming in Procedural-oriented languages. Problem-oriented Languages Fourth-generation languages are also known as problem-oriented languages. These are the languages designed to solve specific problems or develop specific applications by enabling one to describe what he wants rather than step-by-step procedures for getting there. Thus the problem should be considered most rather than procedures so as to get the solution to the particular problem. Visual Basic and PERL are Problem-oriented languages. These languages may be categorized into several kinds of application development tools: Personal computer application software Query languages and report generators Decision support system and financial planning languages Application generators Natural Languages Natural languages are very near to the human conversational language. Natural languages are still in the development stages. These languages will be used most in the areas of artificial intelligence and expert systems. Natural languages have two characteristics: They are designed to make the connections that humans have with computers more natural more humanlike. They are designed to allow the computer to become "smarter" to actually simulate the learning process by remembering and improving upon earlier information. Two popular natural languages are LISP and PROLOG. Compilers and Interpreters Compiler is a program that translates source code into object code. The compiler takes the entire piece of source code and collects and recognizes the instructions. In contrast, the interpreter analyzes and executes each line of source code in succession, without looking at the entire program. The advantage of interpreters is that they can execute a program immediately but compilers require some time before an executable program emerges. However, programs produced by compilers run much faster than the same programs executed by an interpreter. 21 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

2.4.
Introduction

General Software Features and Trends

Now a days software projects are becoming more and more complex in size, sophistication, and technologies used. Most software products are used by huge number of people, not only that, these software support different national languages and come in different sizes and shapes desktop, standard, professional, Enterprise Resource Planning (ERP) packages and so on. Almost all application software products (like word processors, ERP packages) support more than on hardware and/or software platform. For example, we have web browsers for the PC and Mac; we have database management systems that run on MVS, UNIX, Windows NT, and Linux and so on. The competition and the advancements in technology are driving software vendors to include additional functionality and new features to their products just to stay in business. The Information Technology is revolutionizing the way we live and work. The digital technology has given mankind the ability to treat information with mathematical precision, to transmit it at very high accuracy and to manipulate it at will. Features: The following are the trends that play a vital role in the development of software products: Ease of use The software systems are applications are becoming more and more easy to use. Software developers and system analysts are concerned for ensuring that the software they develop are user-friendly than their competitors products. The user interfaces are more intuitive, the error messages are more descriptive, there is context sensitive help, and there are wizards and templates to help the user when one encounters a problem. Graphical User Interface (GUI) Todays software applications and products provide users with intuitive, graphical and easyto-use interfaces. Now the users do not have to remember the cryptic system commands or shortcut keys that were a must in the character based era. Now almost any tasks can be accomplished by a mouse click. For example, in a DOS environment, to copy a file one needs to know the command for copying files, its exact syntax and so on, whereas in the Windows environment, you just have to drag the files you want to copy from the source to destination. Requirement of more powerful hardware Because software vendors are incorporating more and more features into their products these software need more and powerful machines to run. They need more main memory, more secondary storage, and faster and powerful processors. It is also not very difficult to go for new powerful computers as the price of computers are decreasing day by day. Multi-platform capability Todays software applications are not developed for just one platform. Most of the software applications supports multiple platforms both hardware and software platforms. There are software applications that support hardware platforms ranging from mainframes to PCs and different software platforms like MVS, Solaris, AIX, UNIX, Windows and so on. Database like IBMs DB2 Universal is available for a variety of hardware and software platforms. Another important feature of todays software application is that they support multiple languages and multiple currencies. Many vendors are providing their application in many languages like English, Arabic, Japanese and Chinese and so on.

22

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Network Capabilities Network computers are becoming popular as they can work with minimal memory, disk storage and processor power. These computers are connected to a network especially the Internet. The idea behind network computers is that many users who are connected to a network dont need all the computer power they get from a typical personal computer. Instead, they can rely on the power of the network servers. As the popularity of network computers increase, the demand for software that can run these computers are increasing and the software applications of today and tomorrow will have that capability. Compatibility with other software Now a days most of the software products are compatible with each other. For example, we can import HTML documents and other text documents into a Microsoft Word document. Also as newer versions of software are released, most vendors maintain backward compatibility i.e. compatibility with earlier versions. These two features backward compatibility and compatibility with other products make it easier for the users, as they can choose the application they want and still use the old files they created using other applications or using older versions of the same application. Object Linking and Embedding We have mechanism to interact with other software systems. One of the methods to integrate external tolls into an application is using the Object Linking and Embedding (OLE) architecture to link or embed a component from another application running on the computer. OLE is a compound document standard developed by Microsoft Corporation. It enables us to create objects with one application and then link or embed them into a second application. This embedding and linking of components enables applications to share components. Groupwork capabilities Technologies, which support collaboration, are in greater demand today than ever before. Therefore, vendors are integrating collaborating technologies into their products. Distributed workforces, information overload, and getting products to market as quickly as possible are just a few of the motivational aspects pushing collaboration technology development. Mail Enabling The mail enabling of an application is the process through which email is gradually replacing many of the single purpose applications now used on personal computers. In its simplest form, a mail-enabled application is a Windows program that has a Send command in its File menu. For example, the Microsoft Word 2000 has a Send To menu item in the File menu where we can choose to send the document to a mail recipient, fax recipient and son on. Web Enabling With the ever-increasing popularity of Internet and the amount of information that is available on the net, most software application is now web-enabled. Web enabling helps the user in many different ways. During installation, most of the applications will automatically connect the Internet and to the vendors web site and will register their products (earlier one had to fill in a paper form and mail or fax it to the vendor).

23

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Unit 3: Database Management System


3.1.
Data vs Information: Data refers to a collection of natural phenomena descriptors, including the results of experience, observation or experiment, or a set of premises. This may consist of numbers, words, or images, particularly as measurements or observations of a set of variables. Raw data are numbers, characters, images or other outputs from devices to convert physical quantities into symbols, in a very broad sense. Such data are typically further processed by a human or input into a computer, stored and processed there, or transmitted (output) to another human or computer. Raw data is a relative term; data processing commonly occurs by stages, and the "processed data" from one stage may be considered the "raw data" of the next. After processing of data we get information. Information is then useful for decision making. Information is nothing but refined data, data that have been put into meaningful and useful context and communicated to a recipient who uses it to make decisions. File Processing 1. Sequential file processing: It stores and access records in sequence. Such processing can be accomplished either by using tape storage or disk storage. To perform sequential file processing, records are sorted before they are processed. Sequential file processing is used in situations where data ca be processed in batches and where a substantial portion of the master file is changed with processing of each batch. Payroll processing is a classic example of sequential processing. 2. Direct-access file processing: There are many ways of organizing a file for direct-access. First, the file must be stored on a direct-access device like a disk, so that the records need not be processed in sequence. Second, some means must be developed for determining the location of a particular record. Indexes are on common means. Database Processing A database is a self-describing collection of integrated records because it contains a part of itself, a directory, or dictionary of its contents. The records are integrated because a database can contain multiple files (usually called tables in databases processing), and records within those tables are processed by their relationship to one another.

Data Processing

3.2.
Introduction

Database Management System

A collection of programs that enables us to store, modify, and extract information from a database. There are many different types of DBMSs, ranging from small systems that run on personal computers to huge systems that run on mainframes. The following are examples of database applications: computerized library systems automated teller machines flight reservation systems computerized parts inventory systems 24 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

From a technical standpoint, DBMSs can differ widely. The terms relational, network, flat, and hierarchical all refer to the way a DBMS organizes information internally. The internal organization can affect how quickly and flexibly you can extract information. Requests for information from a database are made in the form of a query, which is a stylized question. For example, the query SELECT ALL WHERE NAME = "SMITH" AND AGE > 35 requests all records in which the NAME field is SMITH and the AGE field is greater than 35. The set of rules for constructing queries is known as a query language. Different DBMSs support different query languages, although there is a semi-standardized query language called SQL (structured query language). Sophisticated languages for managing database systems are called fourth-generation languages, or 4GLs for short. The information from a database can be presented in a variety of formats. Most DBMSs include a report writer program that enables you to output data in the form of a report. Many DBMSs also include a graphics component that enables you to output information in the form of graphs and charts. Quality of Information Accuracy: This means the data must be accurate. The data must be clear and accurately reflects the meaning of data on which it is based. It conveys an accurate picture to the recipient and may require a graphical presentation rather than a table full of numbers. Timeliness: The recipients must the get the data within the needed time frame. For example, yesterdays newspaper today or stock quotes a day or two after are normally of little value. Relevancy: This means the information for a particular person must be useful. Information relevant for one person may not be relevant for another.

Significance of DBMS Reduction in data redundancy: Redundancy can be controlled using DBMS. Thus, space is efficiently used. The existing applications can share the data in the database. Reduces problem of inconsistencies in stored information, e.g. different addresses in different departments for the same customer Maintenance of data integrity and quality: Integrity means that the data in the database is accurate. Centralized control of the data helps in permitting the administrator to define integrity constraints to the data in the database. Data are self-documented or self-descriptive: Information on the meaning or interpretation of the data can be stored in the database, e.g. names of items, metadata. Avoidance of inconsistencies: Reducing the redundancy also avoids the inconsistency of data. Data must follow prescribed models, rules, standards

25

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Security restrictions: With complete authority over the operational data, the database administrator can ensure that the only means of access to the database is through proper channels. He can define authorization checks to be carried out whenever access to sensitive data is attempted. Different checks can be established for each type of access (retrieve, modify, delete, etc.), to each piece of information in the database.

Characteristics of Data in a database Shared: Date in a database is shared among different users and applications. Persistence: Data in a database exist permanently in the sense; the data can live beyond the scope of the process that created it. Validity/Integrity/Correctness: Data should be correct with respect to the real world entity that they represent. Security: Data should be protected from unauthorized access. Consistency: Whenever more than one data element in a database represents related realworld values, the values should be consistent with respect to the relationship. Non-redundancy: No two data items in a database should represent the same real-world entity. Independence: The three levels in the schema (internal, conceptual and external) should be independent of each other so that the changes in the schema at one level should not affect the other levels.

Database Management System and its services Transaction Processing: A transaction is a sequence of database operations that represent a logical unit of work. It accesses a database and transforms it from one state to another. A transaction can update a record, delete one, modify a set of records, etc. When the DBMS does a 'commit', the changes made by the transaction are made permanent. If you don't want to make the changes permanent you can roll back the transaction and the database will remain in its original state. Concurrency Management: It is the database management activity of coordinating the actions of database manipulation process that operate concurrently, access shared data and can potentially interface with each other. The goal of an idea concurrency management mechanism is to allow concurrency while maintaining the consistency of the shared data. Recovery: The objective of recovery in a database is to ensure that the aborted or failed transactions do not create any adverse effects on the database or other transactions. Recovery mechanisms in a DBMS make sure that the data is returned to a consistent state after a transaction fails or aborts. Recovery is very much related to concurrency in the sense that, the more the concurrency, the more is the chance of an aborted transaction can affect many other transactions. Security: It refers to the protection of data against unauthorized access. Security mechanism of a DBMS makes sure that only authorized users are given access to the data in the database. The level of access for each user and the operations that each user can For More Class Notes Visit: http://www.bsccsit.com

26

Downloaded from: http://www.bsccsit.com

perform on the data will be monitored and controlled by the DBMS depending on the access privileges of the user. Language Interface: The DBMS provides support languages used for the definition and manipulation of the data in the database. The data structures are created using the data definition language commands. The data manipulation is done using the data manipulation commands. By providing language support for data definition and manipulation, the DBMS create an environment where the users can do their jobs without worrying about the physical implementation. Data catalog: Data catalog or Data Dictionary is a system of database that contains the description of data in the database (metadata). It contains information about data, relationships, constraints and the entire schema that organize these features into a unified database. The data catalog can be queried to get information about the structure of the database. Storage Management: The DBMS provides a mechanism for management of permanent storage of the data. The internal schema defines how the data should be stored by the storage management mechanism and the storage manager interfaces with the operating system to access the physical storage.

Types of Database Management System a) Hierarchical Model: Hierarchical Database model is one of the oldest database models. The hierarchical model assumes that a tree structure is the most frequently occurring relationship. In this model data follow the hierarchical model. Rather than one record type (flat file), a business has to deal with several types which are hierarchically related to each other, e.g. company has several departments, each with attributes: name of director, number of staff, address Certain types of geographical data may fit the hierarchical model well, e.g. Census data organized by state, within state by city, within city by census tract. The database keeps track of the different record types, their attributes, and the hierarchical relationships between them. The attribute which assigns records to levels in the database structure are called the key (e.g. is record a department, part or supplier?) b) Network Model: The Network Model structures in a network connecting every node. The network model was evolved to specifically handle non-hierarchical relationships. The network model has greater flexibility than the hierarchical model for handling complex spatial relationships. c) Relational Model: In an RDBMS, a database is considered to be a collection of interrelated data and programs. The data in a database has to be related. For example, in a College Management System, which takes care of maintaining students' records, storing data such as the salary details of the teachers would be inappropriate and considered unrelated. On the other hand the marks details, fee details and other personal details of students would be considered 'interrelated' data. The programs in a database perform the role of manipulating this data. A database that is designed on the concept of 'relational' model is called a 'Relational Database Management System'. A relational database is made up of set of relations or tables. These tables store user data as well as system data. Each of these relations is made up of attributes (fields) and tuples (records). 27 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Structured Query Language (SQL) serves as a uniform interface for users providing a collection of standard expressions for storing and retrieving data. d) Object-oriented Model: Object-oriented model represents an entity as a class. A class represents both object attributes as well as the behavior of the entity. The objects that falls in the similar class have the similar behavior as mentioned in the class and each object may have special attributes to distinguish itself from other object.

3.3Database Design
Database Design Process:

Real World System

Database Model

Database Representation

To develop a good design, one has to understand the meaning of information and the intended use of the information's stored representation with the computer system. Once we develop the understanding and have identified the use of information in the application, we can determine how much and what kind of information we require. We could also determine in what format these information should be captured and represented in the computer system or database. During this phase, it will become clear that what data entities represent information redundancies and which entities are critical, which are useful and which are not related to the application. It is important to collect and analyze the static and dynamic information available about the real world application before starting the database design. For evolving a good database design, it is important that one uses a model or a database design model.

Data Normalization Normalization is the process of building database structures to store data. Normalization is a formal process of developing data structures in a manner that eliminates redundancy and promotes integrity. Data normalization is a corner stone of the relational theory. Keys: A key uniquely identifies a row in a table. There are two types of keys: intelligent keys and non-intelligent keys. 1. First Normal Form 2. Second normal Form 3. Third Normal Form. Data Warehouse To execute queries efficiently on diverse data, companies have built data warehouses. Data warehouse gather data from multiple sources under a unified schema, at a single site. Thus, they provide the user a single uniform interface to data. 28 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

A data warehouse is a large repository (or archive) of data which comes from operational sources and has four properties: (1) Non volatile (2) Time varying (3) Subject oriented (4) Integrated.

Once gathered, the data are stored for a long time, permitting access to historical data, making decision- support queries easier to write. Moreover, by accessing information for decision support from a data warehouse, the decision maker ensures that online transaction processing systems are not affected by the decision support workload.
Client

Data source 1 Clean Transform Integrate Load

Data Warehouse

Query and analysis tools

Data source 2

Client

Data source N

Fig: Typical architecture of a data warehouse

Properties of Data warehouse Subject-oriented: A data warehouse is organized around major subjects, such as customer, supplier, product, and sales. Data warehouses typically provide a simple and concise view around a particular subject issues by excluding data that are not useful in the decision support system. Integrated: A data warehouse is usually constructed by integrating multiple heterogeneous sources, such as relational databases, flat files, and on-line transaction records. Time-dependent: that is, containing information collected over time which implies there must always be a connection between the information in the warehouse and the time when it was entered. Nonvolatile: Data once loaded in the data warehouse is not going to change in the future. This means that a data warehouse will always be filled with historical data. Data Mining It is a process of semi automatically finding of useful information from large repositories which was not previously found. Simply stated, data mining refers to extracting or "mining" knowledge from large amounts of data. A broad view of data mining functionality: Data mining is the process of discovering interesting knowledge from large amounts of data stored either in databases, data warehouses, or other information repositories. 29 For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Data mining involves an integrating of techniques from multiple disciplines such as database technology, statistics, machine learning, high-performance computing, pattern recognition, neural networks, data visualization, information retrieval, image and signal processing, and spatial data analysis. By performing data mining, interesting knowledge, regularities or high-level information can be extracted from databases and viewed or browsed from different angles. The discovered knowledge can be applied to decision making, process control, information management, and query processing. Therefore, data mining is considered one of the most important frontiers in database systems and one of the most promising interdisciplinary developments in the information industry. Data mining is a step in the Knowledge Discovery Process.

Other notes for reference Computer System Computer system is the combination of input unit, central processing unit, Storage unit and the output unit. There are input devices such as keyboard and mouse. Monitor and printer are output devices. When these peripherals or devices are connected with the computer to achieve a common objective, which will make it a complete set, and referred as "Computer System". Elements of Computer System 1. Input: Data and instructions are input from devices like keyboard, mouse etc. Other input devices are card reader, bar code reader, OCR, scanner, microphone, web camera, touch pad etc. 2. Processor: The processor is also known as CPU (Central Processing Unit). It consists of main memory, control unit and arithmetic and logic unit. It performs operations on data input and returns the result to the output devices. The control unit fetches instructions from main storage, interprets them, and issues the necessary signals to the components. It controls all the hardware operations. The ALU performs all the arithmetic and logic operations. The main memory holds the program instructions for the program to be executed, the input date to be processed and the intermediate results of any processing. Ram is an example of Main memory. 3. Secondary Storage: This unit is the supplement to main memory. Some popular storage devices are Hard Disk, Floppy Disk, Optical disks etc. 4. Output: Main memory gives the result to output devices. The output may be in the form of display or in printed form. Monitor and printer are common output devices. Microprocessor The microprocessor is built onto a single piece of silicon, known as a wafer or chip. Its size is about 0.5 cm square. It is the developed form of integrated circuits manufactured using semiconductor technology. It serves as the CPU in our general computers. Microprocessors evolved rapidly due to Miniaturation of transistors Decreasing distance between transistors on the chip (decreasing line width) Improved conductivity (flow) of electricity Improved instruction sets programmed into the chip.

30

For More Class Notes Visit: http://www.bsccsit.com

Downloaded from: http://www.bsccsit.com

Functions of Processor (CPU) The CPU is the heart of the entire computer system. It performs computations, executes instructions and transfer information to all the parts of a computer. The functions of the processor are listed below: a) It controls the main memory for storing intermediate data and instructions. b) It controls the sequence of operations. c) It gives commands to all parts of the computer system and hence controls all the components. d) It carries out processing i.e. computations on data. Control Unit Access program instructions Decode (interpret) instructions Control flow of data throughout system Data flows through paths called buses Arithmetic-Logic Unit Perform computations on data Perform comparisons on data Registers High speed storage areas Hold data and instructions Primary Storage (Main Memory) Stores instructions from programs Stores data to be processed

THE-END

31

For More Class Notes Visit: http://www.bsccsit.com

You might also like